This document summarizes a paper that examines the performance of interior point methods for solving linear optimization problems. It presents a refined version of the Klee-Minty cubes problem that forces the central path of interior point methods to visit all 2n vertices of an n-dimensional cube.
The key results are:
1) For this problem, the central path must make at least 2n-2 turns before converging to the optimal solution, providing a lower bound on the iteration complexity of interior point methods.
2) The upper bound on iteration complexity for this problem is O(2n*n5/2), nearly matching the lower bound and showing interior point methods can perform close to worst-case on this
This document discusses edge-magic total labelings of graphs. Some key points:
- An edge-magic total labeling assigns integers to the vertices and edges of a graph such that the sum of each edge's label and the labels of its incident vertices is a constant value called the magic sum.
- Necessary conditions for a graph to have an edge-magic total labeling include distinct sums for edge labels and no repeated vertex label sums for non-adjacent vertices.
- Some elementary counting formulas are derived relating the vertex labels, degrees, magic sum, and number of edges and vertices.
- It is shown that if a graph has an even number of edges and the sum of its vertices and edges is
The document presents a decomposition method for solving indefinite quadratic programming problems with n variables and m linear constraints. The method decomposes the original problem into at most m subproblems, each with dimension n-1 and m linear constraints. All global minima, isolated local minima, and some non-isolated local minima of the original problem can be obtained by combining the solutions of the subproblems. The subproblems can then be further decomposed into smaller subproblems until 1-dimensional subproblems are reached, which can be solved directly.
The Probability that a Matrix of Integers Is DiagonalizableJay Liew
The Probability that a
Matrix of Integers Is Diagonalizable
Andrew J. Hetzel, Jay S. Liew, and Kent E. Morrison
1. INTRODUCTION. It is natural to use integer matrices for examples and exercises
when teaching a linear algebra course, or, for that matter, when writing a textbook in
the subject. After all, integer matrices offer a great deal of algebraic simplicity for particular
problems. This, in turn, lets students focus on the concepts. Of course, to insist
on integer matrices exclusively would certainly give the wrong idea about many important
concepts. For example, integer matrices with integer matrix inverses are quite
rare, although invertible integer matrices (over the rational numbers) are relatively
common. In this article, we focus on the property of diagonalizability for integer matrices
and pose the question of the likelihood that an integer matrix is diagonalizable.
Specifically, we ask: What is the probability that an n × n matrix with integer entries is
diagonalizable over the complex numbers, the real numbers, and the rational numbers,
respectively?
We research behavior and sharp bounds for the zeros of infinite sequences of polynomials orthogonal with respect to a Geronimus perturbation of a positive Borel measure on the real line.
Fixed point and common fixed point theorems in vector metric spacesAlexander Decker
This document presents three theorems about the existence and uniqueness of fixed points and common fixed points of mappings in vector metric spaces.
The first theorem proves that if two self-mappings S and T on a vector space satisfy a quasi-contraction condition, then they have a unique fixed point of coincidence. If the mappings are also weakly compatible, then they have a unique common fixed point.
The second theorem proves a similar result for mappings that satisfy a different quasi-contraction condition involving vector metric spaces.
The third theorem generalizes the contraction conditions to prove the existence of a unique point of coincidence and common fixed point for mappings S and T under more general assumptions. Proofs of the theorems use properties
A Generalized Metric Space and Related Fixed Point TheoremsIRJET Journal
This document presents a new concept of generalized metric spaces and establishes some fixed point theorems in these spaces. It begins with defining generalized metric spaces, which generalize standard metric spaces, b-metric spaces, dislocated metric spaces, and modular spaces with the Fatou property. It then proves some properties of generalized metric spaces, including conditions for convergence. Finally, it establishes an extension of the Banach contraction principle to generalized metric spaces, proving the existence and uniqueness of a fixed point under certain assumptions.
The document discusses recursive algorithms and recurrence relations. It provides examples of solving recurrence relations for different algorithms like Towers of Hanoi, selection sort, and merge sort. Recurrence relations define algorithms recursively in terms of smaller inputs. They are solved to find closed-form formulas for the running time of algorithms.
Let Pn(x) be the Legendre polynomial of degree n. Then the generating function for Pn(x) is given by:
∞
1
Pn(x)tn = √
n=0
1 − 2xt + t2
Differentiating both sides with respect to t, we get:
∞
∑nPn(x)tn-1 = -xt(1 − 2xt + t2)-1/2 + (1 − 2xt + t2)-3/2
n=1
Multiplying both sides by (1 − 2xt + t2)1/2, we get:
∞
∑
This document discusses edge-magic total labelings of graphs. Some key points:
- An edge-magic total labeling assigns integers to the vertices and edges of a graph such that the sum of each edge's label and the labels of its incident vertices is a constant value called the magic sum.
- Necessary conditions for a graph to have an edge-magic total labeling include distinct sums for edge labels and no repeated vertex label sums for non-adjacent vertices.
- Some elementary counting formulas are derived relating the vertex labels, degrees, magic sum, and number of edges and vertices.
- It is shown that if a graph has an even number of edges and the sum of its vertices and edges is
The document presents a decomposition method for solving indefinite quadratic programming problems with n variables and m linear constraints. The method decomposes the original problem into at most m subproblems, each with dimension n-1 and m linear constraints. All global minima, isolated local minima, and some non-isolated local minima of the original problem can be obtained by combining the solutions of the subproblems. The subproblems can then be further decomposed into smaller subproblems until 1-dimensional subproblems are reached, which can be solved directly.
The Probability that a Matrix of Integers Is DiagonalizableJay Liew
The Probability that a
Matrix of Integers Is Diagonalizable
Andrew J. Hetzel, Jay S. Liew, and Kent E. Morrison
1. INTRODUCTION. It is natural to use integer matrices for examples and exercises
when teaching a linear algebra course, or, for that matter, when writing a textbook in
the subject. After all, integer matrices offer a great deal of algebraic simplicity for particular
problems. This, in turn, lets students focus on the concepts. Of course, to insist
on integer matrices exclusively would certainly give the wrong idea about many important
concepts. For example, integer matrices with integer matrix inverses are quite
rare, although invertible integer matrices (over the rational numbers) are relatively
common. In this article, we focus on the property of diagonalizability for integer matrices
and pose the question of the likelihood that an integer matrix is diagonalizable.
Specifically, we ask: What is the probability that an n × n matrix with integer entries is
diagonalizable over the complex numbers, the real numbers, and the rational numbers,
respectively?
We research behavior and sharp bounds for the zeros of infinite sequences of polynomials orthogonal with respect to a Geronimus perturbation of a positive Borel measure on the real line.
Fixed point and common fixed point theorems in vector metric spacesAlexander Decker
This document presents three theorems about the existence and uniqueness of fixed points and common fixed points of mappings in vector metric spaces.
The first theorem proves that if two self-mappings S and T on a vector space satisfy a quasi-contraction condition, then they have a unique fixed point of coincidence. If the mappings are also weakly compatible, then they have a unique common fixed point.
The second theorem proves a similar result for mappings that satisfy a different quasi-contraction condition involving vector metric spaces.
The third theorem generalizes the contraction conditions to prove the existence of a unique point of coincidence and common fixed point for mappings S and T under more general assumptions. Proofs of the theorems use properties
A Generalized Metric Space and Related Fixed Point TheoremsIRJET Journal
This document presents a new concept of generalized metric spaces and establishes some fixed point theorems in these spaces. It begins with defining generalized metric spaces, which generalize standard metric spaces, b-metric spaces, dislocated metric spaces, and modular spaces with the Fatou property. It then proves some properties of generalized metric spaces, including conditions for convergence. Finally, it establishes an extension of the Banach contraction principle to generalized metric spaces, proving the existence and uniqueness of a fixed point under certain assumptions.
The document discusses recursive algorithms and recurrence relations. It provides examples of solving recurrence relations for different algorithms like Towers of Hanoi, selection sort, and merge sort. Recurrence relations define algorithms recursively in terms of smaller inputs. They are solved to find closed-form formulas for the running time of algorithms.
Let Pn(x) be the Legendre polynomial of degree n. Then the generating function for Pn(x) is given by:
∞
1
Pn(x)tn = √
n=0
1 − 2xt + t2
Differentiating both sides with respect to t, we get:
∞
∑nPn(x)tn-1 = -xt(1 − 2xt + t2)-1/2 + (1 − 2xt + t2)-3/2
n=1
Multiplying both sides by (1 − 2xt + t2)1/2, we get:
∞
∑
[Vvedensky d.] group_theory,_problems_and_solution(book_fi.org)Dabe Milli
1) The document discusses problems related to group theory.
2) Problem 1 shows that the wave equation for light propagation is invariant under Lorentz transformations.
3) Problem 2 shows that the Schrodinger equation is invariant under a global phase change of the wavefunction, and uses Noether's theorem to show the conservation of probability.
In this talk we consider the question of how to use QMC with an empirical dataset, such as a set of points generated by MCMC. Using ideas from partitioning for parallel computing, we apply recursive bisection to reorder the points, and then interleave the bits of the QMC coordinates to select the appropriate point from the dataset. Numerical tests show that in the case of known distributions this is almost as effective as applying QMC directly to the original distribution. The same recursive bisection can also be used to thin the dataset, by recursively bisecting down to many small subsets of points, and then randomly selecting one point from each subset. This makes it possible to reduce the size of the dataset greatly without significantly increasing the overall error. Co-author: Fei Xie
Third-kind Chebyshev Polynomials Vr(x) in Collocation Methods of Solving Boun...IOSR Journals
This paper proposed the use of third-kind Chebyshev polynomials as trial functions in solving boundary value problems via collocation method. In applying this method, two different collocation points are considered, which are points at zeros of third-kind Chebyshev polynomials and equally-spaced points. These points yielded different results on each considered problem, thus possessing different level of accuracy. The
method is computational very simple and attractive. Applications are equally demonstrated through numerical examples to illustrate the efficiency and simplicity of the approach
On Application of the Fixed-Point Theorem to the Solution of Ordinary Differe...BRNSS Publication Hub
We know that a large number of problems in differential equations can be reduced to finding the solution x to an equation of the form Tx=y. The operator T maps a subset of a Banach space X into another Banach space Y and y is a known element of Y. If y=0 and Tx=Ux−x, for another operator U, the equation Tx=y is equivalent to the equation Ux=x. Naturally, to solve Ux=x, we must assume that the range R (U) and the domain D (U) have points in common. Points x for which Ux=x are called fixed points of the operator U. In this work, we state the main fixed-point theorems that are most widely used in the field of differential equations. These are the Banach contraction principle, the Schauder–Tychonoff theorem, and the Leray–Schauder theorem. We will only prove the first theorem and then proceed.
This document contains the solutions to four problems from an exam in applied ordinary differential equations:
1) It solves an initial value problem involving an integrating factor.
2) It solves a homogeneous first order differential equation using the standard substitution to put it in separable form.
3) It finds an implicit solution to an exact differential equation.
4) It uses Newton's cooling law to model the temperature change of buttermilk over time and determines when the temperature will reach 10 degrees Celsius.
The document provides information about integration, which is the reverse process of differentiation. It discusses indefinite integrals, preparing expressions for integration, using integration to solve differential equations, and evaluating definite integrals between limits. Some key points covered include:
- Indefinite integrals find antiderivatives with a constant term added.
- Definite integrals evaluate the area under a curve between two limits.
- Integrals can be used to find general and particular solutions to differential equations.
- Terms in an expression must be multiplied out and fractions converted before integrating.
This document discusses ordinary differential equations (ODEs). It defines ODEs and differentiates them from partial differential equations. ODEs can be classified by type, order, and linearity. Initial value problems involve solving an ODE with initial conditions specified at a point, while boundary value problems involve conditions at boundary points. The document provides examples of solving first- and second-order initial value problems. It also discusses the existence and uniqueness of solutions to initial value problems under certain continuity conditions on the functions defining the ODE.
The document summarizes the Frame-Stewart algorithm for solving the generalized Tower of Hanoi puzzle with n disks on k pegs. It begins by introducing the standard 3-peg Tower of Hanoi puzzle and recursive solution. It then describes Henry Dudeney's 4-peg variation and the Frame-Stewart algorithm from 1939 for solving the problem with n disks on any number of pegs k. The algorithm uses recursion and finding the optimal partition of disks to minimize the number of moves. The document proves properties of the number of additional moves between problems sizes.
This document provides an overview of several topics in industrial engineering including:
- Linear programming and how to formulate it as a minimization or maximization problem subject to constraints.
- Statistical process control methods like X-bar and R charts to monitor quality.
- Process capability analysis to determine if a process meets specifications.
- Queueing models and their fundamental relationships to model waiting times in systems.
- Simulation techniques like random number generation and the inverse transform method.
- Forecasting methods such as moving averages and exponentially weighted moving averages.
- Linear regression to model relationships between variables and determine coefficients.
- Experimental design topics including randomized block design and analysis of variance calculations.
A Proof of Hypothesis Riemann and it is proven that apply only for equation ζ(z)=0.Also here it turns out that it does not apply in General Case.(DOI:10.13140/RG.2.2.10888.34563/5)
This document discusses linearization of analytic and non-analytic germs of diffeomorphisms in one variable. It addresses Siegel's center problem on formal and analytic linearization, and gives sufficient conditions for linearization to belong to certain algebras of ultradifferentiable germs, including Gevrey classes. Specifically:
1) It gives a positive answer to a question by Yoccoz on obtaining optimal estimates in the analytic case using direct series manipulation rather than renormalization.
2) It proves that the Brjuno condition is sufficient for linearization to belong to the same class as the germ in the ultradifferentiable case.
3) If linearization is allowed to be less regular
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document discusses L1-convergence of the Rees-Stanojević modified cosine sum. It contains the following key points:
1. The author obtains a necessary and sufficient condition for L1-convergence of the Rees-Stanojević sum under the condition that the Fourier coefficients satisfy a certain limit.
2. This generalizes a previous result by Garrett and Stanojević which proved convergence in the L-metric for quasi-convex sequences.
3. As a corollary, the author shows that the L1-convergence of the partial sums of the cosine series is equivalent to the condition that the product of the largest neglected coefficient and log n approaches 0 as n approaches
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
The Euler-Mascheroni constant is calculated by three novel representations over these sets respectively: 1) Turán moments, 2) coefficients of Jensen polynomials for the Taylor series of the Riemann Xi function at s = 1/2 + i.t and 3) even coefficients of the Riemann Xi function around s = 1/2.
The document provides an overview of techniques for solving different types of ordinary differential equations (ODEs):
1. It describes prototypes and solution methods for various types of first-order ODEs, including separable, exact, homogeneous, Bernoulli, and linear.
2. It discusses techniques for solving second and higher-order linear ODEs with constant or Cauchy-Euler coefficients, including the auxiliary equation and using the variation of parameters or undetermined coefficients methods.
3. It mentions series solutions centered around x=0.
4. For homogeneous systems of ODEs, it outlines converting between system and matrix forms, finding eigenvalues and eigenvectors, and using the eigenstructure to solve
The document summarizes research on finding polychromatic solutions to linear equations in an r-bounded coloring of the natural numbers. The research builds on previous work exploring rainbow analogues of classical Ramsey theory results. Key findings include:
1) Theorems were proven showing that for equations of the form ax-by=c with integers a,b,c and gcd(a,b)|c, there exists a polychromatic solution in any r-bounded coloring.
2) Explicit recurrence relations and formulas were defined to generate chains of solutions to equations with two variables.
3) The results for two variables were used to show polychromatic solutions exist for equations with three variables of the form a1
This document discusses a stochastic wave propagation model in heterogeneous media. It presents a general operator theory framework that allows modeling of linear PDEs with random coefficients. For elliptic PDEs like diffusion equations, the framework guarantees well-posedness if the sum of operator norms is less than 2. For wave equations modeled by the Helmholtz equation, well-posedness requires restricting the wavenumber k due to dependencies of operator norms on k. Establishing explicit bounds on the norms remains an open problem, particularly for wave-trapping media.
Coincidence points for mappings under generalized contractionAlexander Decker
1. The document presents a theorem that establishes conditions for the existence of coincidence points between multi-valued and single-valued mappings.
2. It generalizes previous results by Feng and Liu (2004) and Liu et al. (2005) by relaxing the contraction conditions.
3. The main theorem proves that if mappings T and f satisfy generalized contraction conditions involving α and β functions, and the space is orbitally complete, then the mappings have a coincidence point.
The document is an introduction to ordinary differential equations prepared by Ahmed Haider Ahmed. It defines key terms like differential equation, ordinary differential equation, partial differential equation, order, degree, and particular and general solutions. It then provides methods for solving various types of first order differential equations, including separable, homogeneous, exact, linear, and Bernoulli equations. Specific examples are given to illustrate each method.
This document presents reduction formulas for integrals of sinnx and cosnx (where n is greater than or equal to 2). It derives the reduction formulas by repeatedly applying integration by parts. For sinnx, the reduction formula expresses In (the integral of sinnx) in terms of In-1 and In-2. For cosnx, the reduction formula expresses In in terms of In-1 and In-2. The document provides detailed step-by-step working to arrive at each reduction formula.
This short document promotes creating presentations using Haiku Deck on SlideShare. It encourages the reader to get started making their own Haiku Deck presentation by providing a button to click to begin the process. In just one sentence, it pitches the idea of using Haiku Deck on SlideShare to create presentations.
The document discusses the history and development of the city of San Diego, California from its founding in 1769 by Spanish missionaries to its growth into a major city and tourist destination by the early 20th century. It provides details on the establishment of early settlements and missions by Spanish explorers, the shift to Mexican control in the 1820s, the influx of American settlers in the mid-19th century following the Mexican-American War, and the city's expansion through tourism and the development of Balboa Park, Harbor Island, and other attractions in the 1900s.
[Vvedensky d.] group_theory,_problems_and_solution(book_fi.org)Dabe Milli
1) The document discusses problems related to group theory.
2) Problem 1 shows that the wave equation for light propagation is invariant under Lorentz transformations.
3) Problem 2 shows that the Schrodinger equation is invariant under a global phase change of the wavefunction, and uses Noether's theorem to show the conservation of probability.
In this talk we consider the question of how to use QMC with an empirical dataset, such as a set of points generated by MCMC. Using ideas from partitioning for parallel computing, we apply recursive bisection to reorder the points, and then interleave the bits of the QMC coordinates to select the appropriate point from the dataset. Numerical tests show that in the case of known distributions this is almost as effective as applying QMC directly to the original distribution. The same recursive bisection can also be used to thin the dataset, by recursively bisecting down to many small subsets of points, and then randomly selecting one point from each subset. This makes it possible to reduce the size of the dataset greatly without significantly increasing the overall error. Co-author: Fei Xie
Third-kind Chebyshev Polynomials Vr(x) in Collocation Methods of Solving Boun...IOSR Journals
This paper proposed the use of third-kind Chebyshev polynomials as trial functions in solving boundary value problems via collocation method. In applying this method, two different collocation points are considered, which are points at zeros of third-kind Chebyshev polynomials and equally-spaced points. These points yielded different results on each considered problem, thus possessing different level of accuracy. The
method is computational very simple and attractive. Applications are equally demonstrated through numerical examples to illustrate the efficiency and simplicity of the approach
On Application of the Fixed-Point Theorem to the Solution of Ordinary Differe...BRNSS Publication Hub
We know that a large number of problems in differential equations can be reduced to finding the solution x to an equation of the form Tx=y. The operator T maps a subset of a Banach space X into another Banach space Y and y is a known element of Y. If y=0 and Tx=Ux−x, for another operator U, the equation Tx=y is equivalent to the equation Ux=x. Naturally, to solve Ux=x, we must assume that the range R (U) and the domain D (U) have points in common. Points x for which Ux=x are called fixed points of the operator U. In this work, we state the main fixed-point theorems that are most widely used in the field of differential equations. These are the Banach contraction principle, the Schauder–Tychonoff theorem, and the Leray–Schauder theorem. We will only prove the first theorem and then proceed.
This document contains the solutions to four problems from an exam in applied ordinary differential equations:
1) It solves an initial value problem involving an integrating factor.
2) It solves a homogeneous first order differential equation using the standard substitution to put it in separable form.
3) It finds an implicit solution to an exact differential equation.
4) It uses Newton's cooling law to model the temperature change of buttermilk over time and determines when the temperature will reach 10 degrees Celsius.
The document provides information about integration, which is the reverse process of differentiation. It discusses indefinite integrals, preparing expressions for integration, using integration to solve differential equations, and evaluating definite integrals between limits. Some key points covered include:
- Indefinite integrals find antiderivatives with a constant term added.
- Definite integrals evaluate the area under a curve between two limits.
- Integrals can be used to find general and particular solutions to differential equations.
- Terms in an expression must be multiplied out and fractions converted before integrating.
This document discusses ordinary differential equations (ODEs). It defines ODEs and differentiates them from partial differential equations. ODEs can be classified by type, order, and linearity. Initial value problems involve solving an ODE with initial conditions specified at a point, while boundary value problems involve conditions at boundary points. The document provides examples of solving first- and second-order initial value problems. It also discusses the existence and uniqueness of solutions to initial value problems under certain continuity conditions on the functions defining the ODE.
The document summarizes the Frame-Stewart algorithm for solving the generalized Tower of Hanoi puzzle with n disks on k pegs. It begins by introducing the standard 3-peg Tower of Hanoi puzzle and recursive solution. It then describes Henry Dudeney's 4-peg variation and the Frame-Stewart algorithm from 1939 for solving the problem with n disks on any number of pegs k. The algorithm uses recursion and finding the optimal partition of disks to minimize the number of moves. The document proves properties of the number of additional moves between problems sizes.
This document provides an overview of several topics in industrial engineering including:
- Linear programming and how to formulate it as a minimization or maximization problem subject to constraints.
- Statistical process control methods like X-bar and R charts to monitor quality.
- Process capability analysis to determine if a process meets specifications.
- Queueing models and their fundamental relationships to model waiting times in systems.
- Simulation techniques like random number generation and the inverse transform method.
- Forecasting methods such as moving averages and exponentially weighted moving averages.
- Linear regression to model relationships between variables and determine coefficients.
- Experimental design topics including randomized block design and analysis of variance calculations.
A Proof of Hypothesis Riemann and it is proven that apply only for equation ζ(z)=0.Also here it turns out that it does not apply in General Case.(DOI:10.13140/RG.2.2.10888.34563/5)
This document discusses linearization of analytic and non-analytic germs of diffeomorphisms in one variable. It addresses Siegel's center problem on formal and analytic linearization, and gives sufficient conditions for linearization to belong to certain algebras of ultradifferentiable germs, including Gevrey classes. Specifically:
1) It gives a positive answer to a question by Yoccoz on obtaining optimal estimates in the analytic case using direct series manipulation rather than renormalization.
2) It proves that the Brjuno condition is sufficient for linearization to belong to the same class as the germ in the ultradifferentiable case.
3) If linearization is allowed to be less regular
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document discusses L1-convergence of the Rees-Stanojević modified cosine sum. It contains the following key points:
1. The author obtains a necessary and sufficient condition for L1-convergence of the Rees-Stanojević sum under the condition that the Fourier coefficients satisfy a certain limit.
2. This generalizes a previous result by Garrett and Stanojević which proved convergence in the L-metric for quasi-convex sequences.
3. As a corollary, the author shows that the L1-convergence of the partial sums of the cosine series is equivalent to the condition that the product of the largest neglected coefficient and log n approaches 0 as n approaches
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
The Euler-Mascheroni constant is calculated by three novel representations over these sets respectively: 1) Turán moments, 2) coefficients of Jensen polynomials for the Taylor series of the Riemann Xi function at s = 1/2 + i.t and 3) even coefficients of the Riemann Xi function around s = 1/2.
The document provides an overview of techniques for solving different types of ordinary differential equations (ODEs):
1. It describes prototypes and solution methods for various types of first-order ODEs, including separable, exact, homogeneous, Bernoulli, and linear.
2. It discusses techniques for solving second and higher-order linear ODEs with constant or Cauchy-Euler coefficients, including the auxiliary equation and using the variation of parameters or undetermined coefficients methods.
3. It mentions series solutions centered around x=0.
4. For homogeneous systems of ODEs, it outlines converting between system and matrix forms, finding eigenvalues and eigenvectors, and using the eigenstructure to solve
The document summarizes research on finding polychromatic solutions to linear equations in an r-bounded coloring of the natural numbers. The research builds on previous work exploring rainbow analogues of classical Ramsey theory results. Key findings include:
1) Theorems were proven showing that for equations of the form ax-by=c with integers a,b,c and gcd(a,b)|c, there exists a polychromatic solution in any r-bounded coloring.
2) Explicit recurrence relations and formulas were defined to generate chains of solutions to equations with two variables.
3) The results for two variables were used to show polychromatic solutions exist for equations with three variables of the form a1
This document discusses a stochastic wave propagation model in heterogeneous media. It presents a general operator theory framework that allows modeling of linear PDEs with random coefficients. For elliptic PDEs like diffusion equations, the framework guarantees well-posedness if the sum of operator norms is less than 2. For wave equations modeled by the Helmholtz equation, well-posedness requires restricting the wavenumber k due to dependencies of operator norms on k. Establishing explicit bounds on the norms remains an open problem, particularly for wave-trapping media.
Coincidence points for mappings under generalized contractionAlexander Decker
1. The document presents a theorem that establishes conditions for the existence of coincidence points between multi-valued and single-valued mappings.
2. It generalizes previous results by Feng and Liu (2004) and Liu et al. (2005) by relaxing the contraction conditions.
3. The main theorem proves that if mappings T and f satisfy generalized contraction conditions involving α and β functions, and the space is orbitally complete, then the mappings have a coincidence point.
The document is an introduction to ordinary differential equations prepared by Ahmed Haider Ahmed. It defines key terms like differential equation, ordinary differential equation, partial differential equation, order, degree, and particular and general solutions. It then provides methods for solving various types of first order differential equations, including separable, homogeneous, exact, linear, and Bernoulli equations. Specific examples are given to illustrate each method.
This document presents reduction formulas for integrals of sinnx and cosnx (where n is greater than or equal to 2). It derives the reduction formulas by repeatedly applying integration by parts. For sinnx, the reduction formula expresses In (the integral of sinnx) in terms of In-1 and In-2. For cosnx, the reduction formula expresses In in terms of In-1 and In-2. The document provides detailed step-by-step working to arrive at each reduction formula.
This short document promotes creating presentations using Haiku Deck on SlideShare. It encourages the reader to get started making their own Haiku Deck presentation by providing a button to click to begin the process. In just one sentence, it pitches the idea of using Haiku Deck on SlideShare to create presentations.
The document discusses the history and development of the city of San Diego, California from its founding in 1769 by Spanish missionaries to its growth into a major city and tourist destination by the early 20th century. It provides details on the establishment of early settlements and missions by Spanish explorers, the shift to Mexican control in the 1820s, the influx of American settlers in the mid-19th century following the Mexican-American War, and the city's expansion through tourism and the development of Balboa Park, Harbor Island, and other attractions in the 1900s.
Verifying facts for PR | If your mother says she loves, check it outStuart Bruce
Why it is important for PR professionals to verify facts from social media and social networks - and the tools and techniques they can use to verify the facts.
Originally created for a Chartered Institute of Public Relations (CIPR) workshop in London on crisis communications and issues management.
Fotografias durante el proceso del mantenimientoEduar90wili
La Unión Europea ha acordado un embargo petrolero contra Rusia en respuesta a la invasión de Ucrania. El embargo prohibirá las importaciones marítimas de petróleo ruso a la UE y pondrá fin a las entregas a través de oleoductos dentro de seis meses. Esta medida forma parte de un sexto paquete de sanciones de la UE destinadas a aumentar la presión económica sobre Moscú y privar al Kremlin de fondos para financiar su guerra.
Prezentacja do wystąpienia Karoliny Furmańskiej (Centrum Wspierania Aktywności Lokalnej CAL) na trzecim ogólnopolskim kongressie bibliotek publicznych "Biblioteka z wizją", 11-12 października 2012 r.
This CV summarizes Timothy Knell's experience in IT project coordination and technical support roles over the past 15 years. It lists his key achievements in project management, technical direction, and communication. It then details his professional history working on projects such as operating systems upgrades, network installations, audits, and display home technology setup. The CV provides 3 pages of descriptions of Timothy's roles, responsibilities, and outcomes across various employers in both private and public sectors.
Ieva Sliziute is a Lithuanian national with experience in journalism, translation, marketing and social media strategy. She holds a Master's degree in Political Science from Universitat Autonoma de Barcelona and a Bachelor's degree in Journalism from Vilnius University. She is proficient in Spanish, English and French and has strong communication, organizational and digital skills. Currently she works as an assistant at a law firm in Barcelona, providing client communication, translation and social media management.
O documento descreve três momentos importantes para o desenvolvimento da fotografia como arte: (1) Em 1845, John Edwin Mayall ilustra o Pai Nosso com dez fotografias; (2) Em 1892, é criado o Linked Ring no Reino Unido para promover a fotografia como arte; (3) Em 1901, o livro "Photography as a Fine Art" defende a fotografia como uma arte independente da pintura.
This short document promotes creating presentations using Haiku Deck, a tool for making slideshows. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In just one sentence, it pitches the idea of using Haiku Deck to easily create engaging slideshows.
The document discusses recursive algorithms and divide-and-conquer approaches. It provides examples of recursively defining problems like calculating factorials and solving the Tower of Hanoi puzzle. It also discusses analyzing the time complexity of recursive algorithms by modeling the running time as a recursive function and solving the recursion. The document suggests three methods for solving recurrences: substitution, recursion trees, and the master method.
The document discusses solving multiple non-linear equations using the multidimensional Newton-Raphson method. It provides an example of solving for the equilibrium conversion of two coupled chemical reactions. The key steps are: (1) writing the reaction equations in root-finding form as two non-linear equations f1 and f2; (2) defining the Jacobian matrix J with the partial derivatives of f1 and f2; and (3) using the multidimensional Taylor series expansion and Jacobian matrix to linearize the system and iteratively solve for the root where f1 and f2 equal zero.
This document presents a summary of a talk on building a harmonic analytic theory for the Gaussian measure and the Ornstein-Uhlenbeck operator. It discusses how the Gaussian measure is non-doubling but satisfies a local doubling property. It introduces Gaussian cones and shows how they allow proving maximal function estimates for the Ornstein-Uhlenbeck semigroup in a similar way as for the heat semigroup. The talk outlines estimates for the Mehler kernel of the Ornstein-Uhlenbeck semigroup and combines them to obtain boundedness of the maximal function.
This document contains instructions for 5 assignment questions involving numerical integration and solving differential equations. Question 1 involves using the quad function to evaluate several integrals. Question 2 involves using quad to evaluate Fresnel integrals and plot the results. Question 3 involves using Monte Carlo methods to estimate volumes and double integrals. Question 4 involves using Euler's method to solve an initial value problem and analyze errors. Question 5 involves using lsode to solve a system of differential equations modeling atmospheric circulation and experimenting with initial conditions.
The document provides an overview of partitions and some of their applications. It begins with definitions of partitions and partition enumeration. Examples are given of partitions of small numbers. Several formulas are presented for counting partitions, including a generating function and an asymptotic formula. Applications discussed include symmetric functions, where partitions index polynomial bases, and representation theory of the symmetric group, where partitions label irreducible representations. Young diagrams and tableaux are introduced and used to define Schur functions.
Heat equation. Discretization and finite difference. Explicit and implicit Euler schemes. CFL conditions. Continuous Gaussian convolution solution. Linear and non-linear scale spaces. Anisotropic diffusion. Perona-Malik and Weickert model. Variational methods. Tikhonov regularization by gradient descent. Links between variational models and diffusion models. Total-Variation regularization and ROF model. Sparsity and group sparsity. Applications to image deconvolution.
This document contains solutions to 5 problems posed at the IMC 2017 conference. The solutions are summarized as follows:
1) The possible eigenvalues of the matrix A described in Problem 1 are 0, 1, and -1±√3i/2.
2) Problem 2 proves that for any differentiable function f satisfying the Lipschitz condition, f(x)2 < 2Lf(x) for all x.
3) Problem 3 shows that for any set S subset of {1,2,...,2017}, there exists an integer n such that the sequence ak(n) defined in the problem satisfies the property that ak(n) is a perfect square if and only if k is
This document discusses the discrete Fourier transform (DFT) and fast Fourier transform (FFT). It begins by contrasting the frequency and time domains. It then defines the DFT, showing how it samples the discrete-time Fourier transform (DTFT) at discrete frequency points. It provides an example 4-point DFT calculation. It discusses the computational complexity of the direct DFT algorithm and how the FFT reduces this to O(N log N) by decomposing the DFT into smaller transforms. It explains the decimation-in-time FFT algorithm using butterfly operations across multiple stages. Finally, it notes that the inverse FFT can be computed using the FFT along with conjugation and scaling steps.
The document summarizes research on magnetic monopoles in noncommutative spacetime. It begins by motivating noncommutative spacetime as a way to incorporate quantum gravitational effects. It then shows that attempting to quantize spacetime by imposing noncommutativity of coordinates leads to inconsistencies when trying to define a Wu-Yang magnetic monopole in this framework. Specifically, the potentials describing the monopole fail to simultaneously satisfy Maxwell's equations and transform correctly under gauge transformations when expanded to second order in the noncommutativity parameter. This suggests the Dirac quantization condition cannot be satisfied in noncommutative spacetime. Possible reasons for this failure and directions for future work are discussed.
This document summarizes the BTW sandpile model on a square lattice and defines relevant concepts. It describes how sandpiles are represented as height functions on the lattice, stable configurations, toppling rules, addition of sandpiles, and the group structure of recurrent sandpiles. Algorithms to find the identity of this group are developed in later sections.
This document discusses various topics related to sphere packings, lattices, spherical codes, and energy minimization on the sphere. It defines sphere packings, lattices, and spherical codes. It describes problems like finding the densest sphere packing in each dimension, determining optimal spherical codes, and minimizing potential energy on the sphere. Linear programming bounds are introduced as a technique for proving optimality of codes. Properties of positive definite kernels and Gegenbauer polynomials are also summarized.
The document discusses statistical representation of random inputs in continuum models. It provides examples of representing random fields using the Karhunen-Loeve expansion, which expresses a random field as the sum of orthogonal deterministic basis functions and random variables. Common choices for the covariance function in the expansion include the radial basis function and limiting cases of fully correlated and uncorrelated fields. The covariance function can be approximated from samples of the random field to enable representation in applications.
This document contains solutions to 4 problems from an IMC 2020 Online event. Solution 1 computes the number of words of length n over an alphabet that satisfy certain properties, finding the number is 4n-1+2n-1. Solution 2 uses a recurrence relation approach to derive the same formula. Solution 3 uses generating functions to show the number is also 4n-1+2n-1. Solution 4 shows that if a polynomial p satisfies p(x+1)-p(x)=x100 for all x, then p(1-t)≤p(t) for 0≤t≤1/2.
The document summarizes the binomial theorem and properties of binomial coefficients. It provides:
1) The binomial theorem expresses the expansion of (a + b)n as a sum of terms involving binomial coefficients for any positive integer n.
2) Important properties of binomial coefficients are discussed, such as their relationship to factorials and the symmetry of coefficients.
3) Examples are given of using the binomial theorem to find coefficients and solve problems involving divisibility and series of binomial coefficients.
This document discusses conjugate gradient methods for minimizing quadratic functions. It begins by introducing quadratic functions and noting that conjugate gradient methods can minimize them without needing the full Hessian matrix, unlike Newton's method. It then defines what it means for a set of vectors to be conjugate with respect to a positive definite matrix A. Vectors are conjugate if their inner products with respect to A are all zero. The document proves that a set of conjugate vectors forms a basis and describes a simple conjugate gradient algorithm that finds the minimum in n iterations using n conjugate search directions.
The Inverse Smoluchowski Problem, Particles In Turbulence 2011, Potsdam, Marc...Colm Connaughton
This document summarizes Colm Connaughton's presentation on solving the inverse Smoluchowski problem to determine particle collision kernels from observed cluster size distributions. It describes how the forward problem maps kernels to distributions but the inverse problem is ill-posed. Tikhonov regularization is used to obtain approximate kernel reconstructions from numerical solutions with known test kernels, demonstrating partial success in reconstructing kernel features despite ill-posedness. Future work aims to address limitations and applicability to real problems.
We examine the effectiveness of randomized quasi Monte Carlo (RQMC) to improve the convergence rate of the mean integrated square error, compared with crude Monte Carlo (MC), when estimating the density of a random variable X defined as a function over the s-dimensional unit cube (0,1)^s. We consider histograms and kernel density estimators. We show both theoretically and empirically that RQMC estimators can achieve faster convergence rates in
some situations.
This is joint work with Amal Ben Abdellah, Art B. Owen, and Florian Puchhammer.
Similar to How good are interior point methods? Klee–Minty cubes tighten iteration-complexity bounds (20)
This document discusses student organizations and the university system in Germany. It provides an overview of the different types of higher education institutions in Germany, including universities, universities of applied sciences, and arts universities. It describes the degree system including bachelor's, master's, and Ph.D. programs. It also outlines the systems of student participation at universities, using the examples of Leipzig and Hanover. Student councils, departments, and faculty student organizations are discussed.
The document discusses grand challenges in energy and perspectives on moving towards more sustainable systems. It notes that while global energy demand and CO2 emissions rebounded in 2010 after the economic downturn, urgent changes are still needed. It explores perspectives on changing direction, including overcoming barriers like technologies, economies, management, and mindsets. The document advocates a systems approach and backcasting from desirable futures to identify pathways for transitioning between states.
Engineering can play an important role in sustainable development by focusing on meeting human needs over wants and prioritizing projects that serve the most vulnerable populations. Engineers should consider how their work impacts sustainability, affordability, and accessibility. A socially sustainable product is manufactured sustainably and also improves people's lives. Engineers are not neutral and should strive to serve societal needs rather than just generate profits. They can help redefine commerce and an engineering culture focused on meeting needs sustainably through services rather than creating unnecessary products and infrastructure.
Consensus and interaction on a long term strategy for sustainable developmentSSA KPI
The document discusses the need for a long-term vision for sustainable development to address major challenges like climate change, resource depletion, and inequity. A long-term perspective is required because these problems will take consistent action over many years to solve. However, short-term solutions may counteract long-term goals if not guided by an overall strategic vision. Developing a widely accepted long-term sustainable development vision requires input from many stakeholders to find balanced solutions and avoid dead ends. Strategic decisions with long-lasting technological and social consequences need a vision that can adapt to changing conditions over time.
Competences in sustainability in engineering educationSSA KPI
The document discusses competencies in sustainability for engineering education. It defines competencies and lists taxonomies that classify competencies into categories like knowledge, skills, attitudes, and ethics. Engineering graduates are expected to have competencies like critical thinking, systemic thinking, and interdisciplinarity. Analysis of competency frameworks from different universities found that competencies are introduced at varying levels, from basic knowledge to complex problem solving and valuing sustainability challenges. The document also outlines the University of Polytechnic Catalonia's framework for its generic sustainability competency.
The document discusses concepts related to sustainability including carrying capacity, ecological footprint, and the IPAT equation. It provides data on historical and projected world population growth. Examples are given showing the ecological footprint of different countries and how it is calculated based on factors like energy use, agriculture, transportation, housing, goods and services. The human development index is also introduced as a broader measure than GDP for assessing well-being. Graphs illustrate the relationship between increasing HDI, ecological footprint, and the goal of transitioning to sustainable development.
From Huygens odd sympathy to the energy Huygens' extraction from the sea wavesSSA KPI
Huygens observed that two pendulum clocks suspended near each other would synchronize their swings to be 180 degrees out of phase. He conducted experiments that showed the synchronization was caused by small movements transmitted through their common frame. While this discovery did not help solve the longitude problem as intended, it sparked further investigations into coupled oscillators and synchronization phenomena.
1) The document discusses whether dice rolls and other mechanical randomizers can truly produce random outcomes from a dynamics perspective.
2) It analyzes the equations of motion for different dice shapes and coin tossing, showing that outcomes are theoretically predictable if initial conditions can be reproduced precisely.
3) However, in reality small uncertainties in initial conditions mean mechanical randomizers can approximate random processes, even if they are deterministic based on their underlying dynamics.
This document discusses the concept of energy security costs. It defines energy security costs as externalities associated with short-term macroeconomic adjustments to changes in energy prices and long-term impacts of monopoly or monopsony power in energy markets. The document provides references on calculating health and environmental impacts of electricity generation and assessing costs and benefits of oil imports. It also outlines a proposed 4-hour course on basic concepts, examples, and a case study analyzing energy security costs for Ukraine based on impacts of increasing natural gas import prices.
Naturally Occurring Radioactivity (NOR) in natural and anthropic environmentsSSA KPI
This document provides an overview of naturally occurring radioactivity (NOR) and naturally occurring radioactive materials (NORM) with a focus on their relevance to the oil and gas industry. It discusses the main radionuclides of interest, including radium-226, radium-228, uranium, radon-222, and lead-210. It also summarizes the origins of NORM in the oil and gas industry and the types of radiation emitted by NORM.
Advanced energy technology for sustainable development. Part 5SSA KPI
All energy technologies involve risks that must be carefully evaluated and minimized to ensure sustainable development. No technology is perfectly safe, so ongoing analysis of benefits, risks and impacts is needed. Public understanding and acceptance of risks is also important.
Advanced energy technology for sustainable development. Part 4SSA KPI
The document discusses the impacts and benefits of energy technology research, using fusion research as a case study. It outlines four pathways through which energy research can impact economies and societies: 1) direct economic effects, 2) impacts on local communities, 3) impacts on industrial technology capabilities, and 4) long-term impacts on energy markets and technologies. It then analyzes the direct and indirect economic impacts of fusion research investments and the technical spin-offs that fusion research has produced. Finally, it evaluates the potential future role of fusion electricity in global energy markets under environmental constraints.
Advanced energy technology for sustainable development. Part 3SSA KPI
This document discusses using fusion energy for sustainable development through biomass conversion. It proposes a system where fusion energy is used to provide heat for gasifying biomass into synthetic fuels like methane and diesel. Experiments show biomass can be over 95% converted to hydrogen, carbon monoxide and methane gases using nickel catalysts at temperatures of 600-1000 degrees Celsius. A conceptual biomass reactor is presented that could process 6 million tons of biomass per year, consisting of 70% cellulose and 30% lignin, into synthetic fuels to serve as carbon-neutral transportation fuels. Fusion energy could provide the high heat needed for the gasification and synthesis processes.
Advanced energy technology for sustainable development. Part 2SSA KPI
The document summarizes fusion energy technology and its potential for sustainable development. Fusion occurs at extremely high temperatures and is the process that powers the Sun and stars. Researchers are working to develop fusion energy on Earth using hydrogen isotopes as fuel. Key challenges include confining the hot plasma long enough at high density for fusion reactions to produce net energy gain. Progress is being made towards achieving the conditions needed for a sustainable fusion reaction as defined by Lawson's criteria.
Advanced energy technology for sustainable development. Part 1SSA KPI
1. The document discusses the concept of sustainability and sustainable systems. It provides an example of a closed ecosystem with algae, water fleas, and fish, where energy and material balances must be maintained for long-term stability.
2. Key requirements for a sustainable system include energy balance between inputs and outputs, recycling of materials or wastes, and mechanisms to control population relationships and prevent overconsumption of resources.
3. Historically, the environment was seen as external and unchanging, but it is now recognized that the environment co-evolves interactively with the living creatures within it.
This document discusses the use of fluorescent proteins in current biological research. It begins with an overview of the development of optical microscopy and fluorescence techniques. It then focuses on the green fluorescent protein (GFP) and how it has been used as a molecular tag to study protein expression and interactions in living cells through techniques like gene delivery, transfection, viral infection, FRET, and optogenetics. The document concludes that fluorescent proteins have revolutionized cell biology by enabling the real-time visualization and control of molecular pathways and signaling processes in living systems.
Neurotransmitter systems of the brain and their functionsSSA KPI
1. Neurotransmitters are chemical substances released at synapses that transmit signals between neurons. The main neurotransmitters in the brain are acetylcholine, serotonin, dopamine, norepinephrine, glutamate, GABA, and endorphins.
2. Each neurotransmitter system is involved in regulating key brain functions and behaviors such as movement, mood, sleep, cognition, and pain perception.
3. Neurotransmitters act via membrane receptors on target neurons, including ionotropic receptors that are ligand-gated ion channels and metabotropic G-protein coupled receptors.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
How to Setup Default Value for a Field in Odoo 17Celine George
In Odoo, we can set a default value for a field during the creation of a record for a model. We have many methods in odoo for setting a default value to the field.
How to Manage Reception Report in Odoo 17Celine George
A business may deal with both sales and purchases occasionally. They buy things from vendors and then sell them to their customers. Such dealings can be confusing at times. Because multiple clients may inquire about the same product at the same time, after purchasing those products, customers must be assigned to them. Odoo has a tool called Reception Report that can be used to complete this assignment. By enabling this, a reception report comes automatically after confirming a receipt, from which we can assign products to orders.
2. 2 A. Deza et al.
More precisely, they considered a maximization problem over an n-dimensional
“squashed” cube and proved that a variant of the simplex method visits all its 2n
vertices. Thus, the time complexity is not polynomial for the worst case, as 2n −1
iterations are necessary for this n-dimensional linear optimization problem. The
pivot rule used in the Klee–Minty example was the most negative reduced cost
but variants of the Klee–Minty n-cube allow to prove exponential running time
for most pivot rules; see [11] and the references therein. The Klee–Minty worst-
case example partially stimulated the search for a polynomial algorithm and,
in 1979, Khachiyan’s [5] ellipsoid method proved that linear programming is
indeed polynomially solvable. In 1984, Karmarkar [4] proposed a more effi-
cient polynomial algorithm that sparked the research on polynomial interior
point methods. In short, while the simplex method goes along the edges of the
polyhedron corresponding to the feasible region, interior point methods pass
through the interior of this polyhedron. Starting at the analytic center, most inte-
rior point methods follow the so-called central path and converge to the analytic
center of the optimal face; see e.g. [7, 9, 10, 14, 15]. In 2004, Deza et al. [2] showed
that, by carefully adding an exponential number of redundant constraints to the
Klee–Minty n-cube, the central path can be severely distorted. Specifically, they
provided an example for which path-following interior point methods have to
take 2n − 2 sharp turns as the central path passes within an arbitrarily small
neighborhood of the corresponding vertices of the Klee–Minty cube before
converging to the optimal solution. This example yields a theoretical lower
bound for the number of iterations needed for path-following interior point
methods: the number of iterations is at least the number of sharp turns; that is,
n ).
the iteration-complexity lower bound is (2√ On the other hand, the theoret-
ical iteration-complexity upper bound is O( NL) where N and L respectively
denote the number of constraints and the bit-length of the input-data. The
iteration-complexity upper bound for the highly redundant Klee–Minty n-cube
of [2] is O(23n nL) = O(29n n4 ), as N = O(26n n2 ) and L = O(26n n3 ) for this
example. Therefore, these 2n − 1 sharp turns yield an ( 6 lnNN ) iteration-com-
2
plexity lower bound. In this paper we show that a refined problem with the same
(2n ) iteration-complexity lower bound exhibits a nearly worst-case iteration-
5
complexity as the complexity upper bound is O(2n n 2 ). In other words, this new
example, with N = O(22n n3 ), essentially closes the iteration-complexity gap
√
with an ( lnNN ) lower bound and an O( N ln N) upper bound.
3
2 Notations and the main results
We consider the following Klee–Minty variant where ε is a small positive factor
by which the unit cube [0, 1]n is squashed.
min xn ,
subject to 0 ≤ x1 ≤ 1,
ε xk−1 ≤ xk ≤ 1 − ε xk−1 for k = 2, . . . , n.
3. How good are interior point methods? 3
The above minimization problem has 2n constraints, n variables and the feasible
region is an n-dimensional cube denoted by C. Some variants of the simplex
method take 2n − 1 iterations to solve this problem as they visit all the ver-
tices ordered by the decreasing value of the last coordinate xn starting from
v{n} = (0, . . . , 0, 1) till the optimal value x∗ = 0 is reached at the origin v∅ .
n
While adding a set h of redundant inequalities does not change the feasible
region, the analytic center χ h and the central path are affected by the addi-
tion of redundant constraints. We consider redundant inequalities induced by
hyperplanes parallel to the n facets of C containing the origin. The constraint
parallel to the facet H1 : x1 = 0 is added h1 times at a distance d1 and the
constraint parallel to the facet Hk : xk = εxk−1 is added hk times at a distance
dk for k = 2, . . . , n. The set h is denoted by the integer-vector h = (h1 , . . . , hn ),
d = (d1 , . . . , dn ), and the redundant linear optimization problem is defined by
min xn
subject to 0 ≤ x1 ≤ 1
ε xk−1 ≤ xk ≤ 1 − ε xk−1 for k = 2, . . . , n
0 ≤ d1 + x1 repeated h1 times
ε x1 ≤ d2 + x2 repeated h2 times
.
. .
.
. .
ε xn−1 ≤ dn + xn repeated hn times.
By analogy with the unit cube [0, 1]n , we denote the vertices of the Klee–Minty
cube C by using a subset S of {1, . . . , n}, see Fig. 1. For S ⊂ {1, . . . , n}, a vertex
vS of C is defined by
1, if 1 ∈ S
vS =
1 0, otherwise
1 − εvS , if k ∈ S
vS = k−1 k = 2, . . . , n.
k εvS ,
k−1 otherwise
The δ-neighborhood Nδ (vS ) of a vertex vS is defined, with the convention x0 = 0,
by
1 − xk − εxk−1 ≤ εk−1 δ, if k ∈ S
Nδ (vS ) = x ∈ C : k = 1, . . . , n .
xk − εxk−1 ≤ εk−1 δ, otherwise
In this paper we focus on the following problem Cn defined by
δ
ε= n
2(n+1) ,
d= n(2n+4 , . . . , 2n−k+5 , . . . , 25 ),
22n+8 (n+1)n 2n+7 (n+1) 22n+8 (n+1)n+k−1
h= δnn−1
− δ ,..., δnn+k−2
4. 4 A. Deza et al.
Fig. 1 The δ-neighborhoods
v {2}
of the four vertices of the
Klee–Minty 2-cube
v {1,2}
v {1}
v∅
n+k+6 (n+1)2k−1 2n+6 (n+1)2n−1
−2 δn2k−2
, . . . , 32 δn2n−2
,
where 0 < δ ≤ 1
4(n+1) .
Note that we have: ε + δ < 1 ; that is, the δ-neighborhoods of the 2n vertices
2
are non-overlapping, and that h is, up to a floor operation, linearly dependent
on δ −1 . Proposition 2.1 states that, for Cn , the central path takes at least 2n − 2
δ
turns before converging to the origin as it passes through the δ-neighborhood
of all the 2n vertices of the Klee-Minty n-cube; see Sect. 3.2 for the proof. Note
that the proof given in Sect. 3.2 yields a slightly stronger result than Propo-
sition 2.1: In addition to pass through the δ-neighborhood of all the vertices,
the central path is bent along the edge-path followed by the simplex method.
We set δ = 4(n+1) in Propositions 2.3 and 2.4 in order to exhibit the sharpest
1
bounds. The corresponding linear optimization problem Cn 1/4(n+1) depends only
on the dimension n.
Proposition 2.1 The central path P of Cn intersects the δ-neighborhood of each
δ
vertex of the n-cube.
Since the number of iterations required by path-following interior point meth-
ods is at least the number of sharp turns, Proposition 2.1 yields a theoretical
lower bound for the iteration-complexity for solving this n-dimensional linear
optimization problem.
Corollary 2.2 For Cn , the iteration-complexity lower bound of path-following
δ
interior point methods is (2n ).
Since the theoretical iteration-complexity upper bound for path-following
√
interior point methods is O NL , where N and L respectively denote the
number of constraints and the bit-length of the input-data, we have:
Proposition 2.3 For Cn
1/4(n+1) , the iteration-complexity upper bound of path-
3 11
following interior point methods is O(2n n 2 L); that is, O(23n n 2 ).
5. How good are interior point methods? 5
n+k
n n
Proof We have N = 2n + k=1 hk = 2n + k=1 n
2 22n+10 n+1
n − 2n+k+8
2k n+k
n
n+1
n and, since k=1
n+1
n ≤ ne2 , we have N = O(22n n3 ) and L ≤
N ln d1 = O(22n n4 ).
Noticing that the only two vertices with last coordinates smaller than or equal
{1}
to εn−1 are v∅ and v{1} , with v∅ = 0 and vn = εn−1 , the stopping criterion can be
n
replaced by: stopping duality gap smaller than εn with the corresponding central
path parameter at the stopping point being µ∗ = ε . Additionally, one can check
n
N
that by setting the central path parameter to µ0 = 1, we obtain a starting point
which belongs to the interior of the δ-neighborhood of the highest vertex v{n} ,
see Sect. 3.3 for a detailed proof. In other words, a path-following algorithm
using a standard -precision as stopping criterion can stop when the duality
gap is smaller than εn as the optimal vertex is identified, see [9]. The corre-
√
sponding iteration-complexity bound O( N log N ) yields, for our construction,
√ Nµ0 √
a precision-independent iteration-complexity O( N ln Nµ∗ ) = O( Nn) and
Proposition 2.3 can therefore be strengthened to:
Proposition 2.4 For Cn
1/4(n+1) , the iteration-complexity upper bound of path-
5
following interior point methods is O(2n n 2 ).
Remark 2.5
(i) For Cn
1/4(n+1) , by Corollary 2.2 and Proposition 2.4, the order of the iter-
ation-complexity of path-following interior point methods is between 2n
5 √
and 2n n 2 or, equivalently, between lnNN and N ln N.
3
(ii) The k-th coordinate of the vector d corresponds to the scalar d defined
in [2] for dimension n − k + 3.
(iii) Other settings for d and h ensuring that the central path visits all the
vertices of the Klee–Minty n-cube are possible. For example, d can be set
to (1.1, 22) in dimension 2.
(iv) Our results apply to path-following interior point methods but not to
other interior point methods such as Karmarkar’s original projective
algorithm [4].
Remark 2.6
(i) Megiddo and Schub [8] proved, for affine scaling trajectories, a result
with a similar flavor as our result for the central path, and noted that
their approach does not extend to projective scaling. They considered
the non-redundant Klee–Minty √ cube.
(ii) Todd and Ye [12] gave an ( 3 N) iteration-complexity lower bound
between two updates of the central path parameter µ.
(iii) Vavasis and Ye [13] provided an O(N 2 ) upper bound for the number of
approximately straight segments of the central path.
6. 6 A. Deza et al.
(iv) A referee pointed out that a knapsack problem with proper objective
function yields an n-dimensional example with n + 1 constraints and n
sharp turns.
(v) Deza et al. [3] provided a non-redundant construction with N constraints
and N − 4 sharp turns.
3 Proofs of Proposition 2.1 and Proposition 2.4
3.1 Preliminary lemmas
˜
Lemma 3.1 With b= 4 (1, . . . , 1), ε= 2(n+1) , d=n(2n+4 , . . . , 2n−k+5 , . . . , 25 ), h =
n
δ
22n+8 (n+1)n 2n+7 (n+1) 2n+8 (n+1)n+k−1 n+k+6 (n+1)2k−1 2n+6 (n+1)2n−1
δnn−1
− δ , . . . , 2 δnn+k−2 −2 δn2k−2
, . . . , 32 δn2n−2
and
⎛ −ε ⎞
1
d1 +1 d2 0 0 ... 0 0
⎜ −1 −ε2 ⎟
⎜ 2ε
d2 +1 0 ... 0 0 ⎟
⎜ d1 d3 ⎟
⎜ . . .. .. . . . ⎟
⎜ .
. .
. . . .
. .
. .
. ⎟
⎜ ⎟
⎜ −1 2εk−1 −εk ⎟
A=⎜ 0 0 dk +1 0 0 ⎟,
⎜ d1 dk+1
⎟
⎜ .
. .
. .
. .
. .. .. ⎟
⎜ . . . . . . 0 ⎟
⎜ ⎟
⎜ −1
0 0 0 ... 2εn−2 −εn−1 ⎟
⎝ d1 dn−1 +1 dn ⎠
−1 2εn−1
d1 0 0 0 ... 0 dn +1
˜
we have Ah ≥ 3b
2 .
˜
Proof As ε = 2(n+1) and d = n(2n+4 , . . . , 2n−k+5 , . . . , 25 ), h can be rewritten as
n
˜ ˜
h = 4 d1 ( ε4n − 1 ), . . . , εdk ( ε4n − ε1k ), . . . , εdn ε3n and Ah ≥ 3b can be rewritten
δ ε k−1 n−1 2
as
4 d1 4 1 4 4 1 6
− − − 2 ≥
δ d1 + 1 εn ε δ εn ε δ
4 4 1 4 2dk 4 1 4 4 1 6
− − + − − − k+1 ≥ for k = 2, . . . , n−1
δ εn ε δ dk + 1 εn εk δ εn ε δ
4 4 1 4 2dn 3 6
− − + ≥ ,
δ εn ε δ dn + 1 εn δ
which is equivalent to
1 1 3 4 1 3
− − d1 ≥ n − 2 + ,
ε2 ε 2 ε ε 2
1 2 1 3 8 1 1 3
− k+ − dk ≥ n − k+1 − + for k = 2, . . . , n − 1,
εk+1 ε ε 2 ε ε ε 2
7. How good are interior point methods? 7
2 1 3 4 1 3
+ − dn ≥ n − + .
ε n ε 2 ε ε 2
As ε12 − 1 − 3 ≥ 1 ,
ε 2 2
1
ε − 3
2 ≥ 0, 1
ε2
− 3
2 ≥ 0 and 1
εk+1
+ 1
ε − 3
2 ≥ 0, the above
system is implied by
1 4
d1 ≥ n ,
2 ε
1 2 8
− k dk ≥ n for k = 2, . . . , n − 1,
εk+1 ε ε
2 4
d ≥ n,
n n
ε ε
n−k
as εk+1 − ε2k =
1 2
nεk
and 1
εn−k
= 2n−k 1 + 1
n ≤ 2n−k+2 , the above system is
implied by
d1 ≥ 2n+5 ,
dk ≥ n2n−k+4 for k = 2, . . . , n − 1,
dn ≥ 2,
which is true since d = n(2n+4 , . . . , 2n−k+5 , . . . , 25 ).
˜
Corollary 3.2 With the same assumptions as in Lemma 3.1 and h = h , we have
Ah ≥ b.
˜
Proof Since 0 ≤ hk − hk < 1 and dk = n2n−k+5 , we have:
˜
h1 − h1 ˜
(h2 − h2 )ε 2
− ≤ ,
d1 + 1 d2 δ
˜
h1 − h1 ˜
2(hk − hk )εk−1 ˜
(hk+1 − hk+1 )εk 2
− + − ≤ for k = 2, . . . , n − 1,
d1 dk + 1 dk+1 δ
˜
h1 − h1 ˜
2(hn − hn )εn−1 2
− + ≤ ,
d1 dn + 1 δ
˜ ˜
thus, A(h − h) ≤ b , which implies, since Ah ≥ 3b
by Lemma 3.1, that Ah ≥ b.
2 2
˜
Corollary 3.3 With the same assumptions as in Lemma 3.1 and h = h , we have:
hk εk−1 hk+1 εk
dk +1 ≥ dk+1 + 4
δ for k = 1, . . . , n − 1.
Proof For k = 1, . . . , n − 1, one can easily check that the first k inequalities of
hk εk−1 hk+1 εk
Ah ≥ b imply dk +1 ≥ dk+1 + 4.
δ
8. 8 A. Deza et al.
The analytic center χ n = (ξ1 , . . . , ξn ) of Cn is the unique solution to the
n n
δ
problem consisting of maximizing the product of the slack variables:
s1 = x1
sk = xk − εxk−1 for k = 2, . . . , n
¯
s1 = 1 − x1
¯
sk = 1 − εxk−1 − xk for k = 2, . . . , n
˜
s1 = d1 + s1 repeated h1 times
.
. .
.
. .
˜
sn = dn + sn repeated hn times.
Equivalently, χ n is the solution of the following maximization problem:
n
max ¯ ˜
ln sk + ln sk + hk ln sk ,
x
k=1
i.e., with the convention x0 = 0,
n
max ln(xk − εxk−1 ) + ln(1 − εxk−1 − xk ) + hk ln(dk + xk − εxk−1 ) .
x
k=1
The optimality conditions (the gradient is equal to zero at optimality) for this
concave maximization problem give:
⎧ hk+1 ε
ε ε hk
⎪ σ1n −
⎨ σk+1
n − 1
σk
¯n
− σk+1
¯n
+ σk
˜n
−
σk+1
˜n
= 0 for k = 1, . . . , n − 1,
k
1
n − σn + σn
1 hn
=0 (1)
⎪
⎩ σn ¯n ˜n
σk > 0, σk > 0, σk
n ¯n ˜n > 0 for k = 1, . . . , n,
where
n n
σ1 = ξ1
n n n
σk = ξk − εξk−1 for k = 2, . . . , n,
n n
σ1 = 1 − ξ1
¯
¯n n n
σk = 1 − εξk−1 − ξk for k = 2, . . . , n,
˜n
σk = dk + σkn
for k = 1, . . . , n.
The following lemma states that, for Cn , the analytic center χ n belongs to the
δ
neighborhood of the vertex v{n} = (0, . . . , 0, 1).
Lemma 3.4 For Cn , we have: χ n ∈ Nδ (v{n} ).
δ
9. How good are interior point methods? 9
Proof Adding the nth equation of (1) multiplied by −εn−1 to the jth equation
of (1) multiplied by εj−1 for j = k, . . . , n − 1, we have, for k = 1, . . . , n − 1,
n−2
εk−1 εk−1 2εn−1 εi hk εk−1 2hn εn−1
n − σn − σn − 2
σk ¯k n +
σi+1
¯ σk
˜ n −
σn
˜n
= 0,
n i=k
implying:
n−2
2hn εn−1 hk εk−1 εk−1 εk−1 2εn−1 εi εk−1
− = n − n + σn + 2 ≤ n ,
σn
˜ n σk
˜ n σk σk
¯ n σi+1
¯n σk
i=k
h1 hk εk−1
which implies, since σn ≤ dn + 1, σk ≥ dk and
˜n ˜n d1 ≥ dk by Corollary 3.3,
2hn εn−1 h1 εk−1
− ≤ n ,
dn + 1 d1 σk
implying, since 2hn ε − h1 ≥
n−1
dn +1 d
1
δ by Corollary 3.2, σk ≤ εk−1 δ for k = 1, . . . , n−1.
n
1
hn εn−1 εn−1
The n-th equation of (1) implies: σn
˜n
≤ σn
¯n
; that is, since σn < dn + 1 and
˜n
hn εn−1 hn ε n−1
εn−1
dn +1 ≥ 1
δ by Corollary 3.2, we have: 1 δ ≤ dn +1 ≤ σn
¯n
, implying: σn ≤ εn−1 δ.
¯n
The central path P of Cn can be defined as the set of analytic centers χ n (α) =
δ
(xn , . . . , xn , α) of the intersection of the hyperplane Hα : xn = α with the
1 n−1
feasible region of Cn where 0 < α ≤ ξn , see [9]. These intersections (α) are
δ
n
called the level sets and χ n (α) is the solution of the following system:
ε ε hk hk+1 ε
1
sn
− sn
− 1
¯k
sn
− ¯k+1 + sn − sn
sn ˜k ˜k+1 =0 for k = 1, . . . , n − 1
k k+1 (2)
k ¯k ˜k
sn > 0, sn > 0, sn >0 for k = 1, . . . , n − 1,
where
sn
1 = xn
1
sn
k = xn − εxn
k k−1 for k = 2, . . . , n − 1,
sn
n = α − εxn−1
¯1
sn = 1 − xn
1
¯k
sn = 1 − εxn − xn
k−1 k for k = 2, . . . , n − 1,
¯n
sn = 1 − α − εxn
n−1
˜k
sn = dk + sn
k for k = 1, . . . , n.
¯ ˆk
Lemma 3.5 For Cn , Cδ = {x ∈ C : sk ≥ εk−1 δ, sk ≥ εk−1 δ} and Cδ = {x ∈ C :
k
δ
¯ ˆk
sk−1 ≤ εk−2 δ, sk−2 ≤ εk−3 δ, . . . , s1 ≤ δ}, we have: Cδ ∩ P ⊆ Cδ for k = 2, . . . , n.
k
10. 10 A. Deza et al.
Proof Let x ∈ Cδ ∩ P. Adding the (k − 1)th equation of (2) multiplied by −εk−2
k
to the ith equation of (1) multiplied by εi−1 for i = j . . . , k − 2, we have, for
k = 2, . . . , n − 1,
2hk−1 εk−2 hj εj−1 hk εk−1 εj−1 εk−1 εk−1
− + + + n + n + n
˜k−1
sn ˜j
sn ˜k
sn sj sk ¯
sk
⎛ ⎞
k−3
2εk−2 εj−1 εi ⎠
−⎝ n + n +2 = 0,
sk−1 ¯
sj ¯ n
si+1
i=j
˜k−1 ˜j ˜k
which implies, since sn < dk−1 + 1, sn > dj , sn > dk and sn ≥ εk−1 δ and
k
¯k
sn ≥ εk−1 δ as x ∈ Cδ ,
k
2hk−1 εk−2 hj εj−1 hk εk−1 εj−1 2
− − ≤ n + ,
dk−1 + 1 dj dk sj δ
h1 hj εj−1
implying, since d1 ≥ dj by Corollary 3.3,
h1 2hk−1 εk−2 hk εk−1 εj−1 2
− + − ≤ n + ,
d1 dk−1 + 1 dk sj δ
2h εk−2
ε k−1
that is, as 3 ≤ − h1 + dk−1 +1 − hkd by Corollary 3.2: sn ≤ εj−1 δ. Considering
δ d1 j
k−1 k
the (k − 1)th equation of (2), we have
hk−1 εk−2 hk εk−1 εk−2 εk−1 εk−1 εk−2
− = n + n + n − n ,
˜ n
sk−1 ˜
skn ¯
sk−1 sk ¯
sk sk−1
˜k−1 ˜k ¯k
which implies, since sn < dk−1 + 1, sn > dk and sn ≥ εk−1 δ and sn ≥ εk−1 δ as
k
x ∈ Cδ ,
k
hk−1 εk−2 hk εk−1 εk−2 2
− ≤ n + ,
dk−1 + 1 dk ¯
sk−1 δ
hk−1 εk−2 hk εk−1
which implies, since 3 ≤
δ dk−1 +1 − dk ¯k−1
by Corollary 3.3, that sn ≤ εk−2 δ
ˆ k.
and, therefore, x ∈ C δ
3.2 Proof of Proposition 2.1
For k = 2, . . . , n, while Cδ , defined in Lemma 3.5, can be seen as the central part
k
k ¯
of the cube C, the sets Tδ = {x ∈ C : sk ≤ εk−1 δ} and Bk = {x ∈ C : sk ≤ εk−1 δ},
δ
11. How good are interior point methods? 11
Fig. 2 The set Pδ for the Klee–Minty 3-cube
3
T0
ˆ3
C0
2
B0 ˆ2
C0 2
T0
3
B0
A2
0 A3
0
Fig. 3 The sets A2 and A3 for the Klee–Minty 3-cube
0 0
can be seen, respectively, as the top and bottom part of C. Clearly, we have
k k ˆk
C = Tδ ∪ Cδ ∪ Bk for each k = 2, . . . , n. Using the set Cδ defined in Lemma 3.5,
δ
k ˆk
we consider the set Ak = Tδ ∪ Cδ ∪ Bk for k = 2 . . . , n, and, for 0 < δ ≤ 4(n+1) ,
1
δ δ
we show that the set Pδ = n Ak , see Fig. 2, contains the central path P. By
k=2 δ
Lemma 3.4, the starting point χ n of P belongs to Nδ (v{n} ). Since P ⊂ C and
C = n (Tδ ∪ Cδ ∪ Bk ), we have:
k=2
k k
δ
n n
P=C∩P= Tδ ∪ Cδ ∪ Bk ∩ P =
k k
δ Tδ ∪ Cδ ∩ P ∪ Bk ∩ P,
k k
δ
k=2 k=2
that is, by Lemma 3.5,
n n
P⊆ k ˆk
Tδ ∪ Cδ ∪ Bk = Ak = Pδ
δ δ
k=2 k=2
k ˆk
Remark that the sets Cδ , Cδ , Tδ , Bk and Ak can be defined for δ = 0, see Fig. 3,
k
δ δ
and that the corresponding set P0 = n Ak is precisely the path followed
k=2 0
by the simplex method on the original Klee-Minty problem as it pivots along
the edges of C. The set Pδ is a δ-sized (cross section) tube along the path P0 .
See Fig. 4 illustrating how P0 starts at v{n} , decreases with respect to the last
coordinate xn and ends at v∅ .
12. 12 A. Deza et al.
Fig. 4 The path P0 followed
v {3}
by the simplex method for the
Klee–Minty 3-cube
v {1,3} v {2,3}
v {1,2,3}
v {2}
v {1,2}
∅
v v {1}
3.3 Proof of Proposition 2.4
¯
We consider the point x of the central path which lies on the boundary of the
δ-neighborhood of the highest vertex v{n} . This point is defined by: s1 = δ, sk ≤
εk−1 δ for k = 2, . . . , n − 1 and s2n ≤ εn δ. Note that the notation sk for the cen-
tral path (perturbed complementarity) conditions, yk sk = µ for k = 1, . . . , pn ,
is consistent with the slacks introduced after Corollary 3.3 with sn+k = sk for ¯
˜
k = 1, . . . , n and spi +k = sk for k = 1, . . . , hi+1 Ê and i = 0, . . . , n − 1. Let µ
¯
¯
denote the central path parameter corresponding to x. In the following, we
prove that µ ≤ εn−1 δ which implies that any point of the central path with
¯
corresponding parameter µ ≥ µ belong to the interior of the δ-neighborhood
¯
of the highest vertex v{n} . In particular, it implies that by setting the central path
parameter to µ0 = 1, we obtain a starting point which belongs to the interior of
the δ-neighborhood of the vertex v{n} .
3.3.1 Estimation of the central path parameter µ
¯
The formulation of the dual problem of Cn is:
δ
2n n pk
max z=− yk − dk yi
k=n+1 k=1 i=pk−1 +1
subject to yk − εyk+1 − yn+k − εyn+k+1
pk pk+1
+ yi − ε yi = 0 for k = 1, . . . , n − 1
i=pk−1 +1 i=pk +1
pn
yn − y2n + yi = 1
i=pn−1 +1
yk ≥ 0 for k = 1, . . . , pn ,
where p0 = 2n and pk = 2n + h1 + · · · + hk for k = 1, . . . , n.
13. How good are interior point methods? 13
For k = 1, . . . , n, multiplying by εk−1 the kth equation of the above dual
constraints and summing then up, we have:
2n+h1
y1 − yn+1 − 2 εyn+2 + ε2 yn+3 + · · · + εn−1 y2n + yi = εn−1
i=2n+1
which implies
2n+h1
n−1
2ε y2n ≤ y1 + yi
i=2n+1
µ¯
implying, since for i = 2n + 1, . . . , 2n + h1 , d1 ≤ si yields yi ≤ d1 , that
µh1
¯ µ µh1
¯ ¯
2εn−1 y2n ≤ y1 + = + .
d1 δ d1
µ
¯
¯ ¯
Since for i = pn−1 + 1, . . . , pn , si = dn + xn − εxn−1 ≤ dn + 1 yields yi ≥ dn +1 ,
the last dual constraint implies
pn
µhn
¯
y2n ≥ yi − 1 ≥ −1
dn + 1
i=pn−1 +1
2hn εn−1 h1
which, combined with the previously obtained inequality, gives µ
¯ dn +1 − d1
2hn εn−1 h1
−1
δ ≤ 2εn−1 , and, since Corollary 3.2 gives dn +1 − d1 − δ ≥ δ , we have
1 2
µ ≤ εn−1 δ.
¯
Acknowledgments We would like to thank an associate editor and the referees for pointing out
the paper [8] and for helpful comments and corrections. Many thanks to Yinyu Ye for precious sug-
gestions and hints which triggered this work and for informing us about the papers [12, 13]. Research
supported by an NSERC Discovery grant, by a MITACS grant and by the Canada Research Chair
program.
References
1. Dantzig, G.B.: Maximization of a linear function of variables subject to linear inequalities. In:
Koopmans, T.C. (ed.) Activity Analysis of Production and Allocation, pp. 339–347. Wiley, New
York (1951)
2. Deza, A., Nematollahi, E., Peyghami, R., Terlaky, T.: The central path visits all the vertices of
the Klee–Minty cube. Optim. Methods Softw. 21–5, 851–865 (2006)
3. Deza, A., Terlaky, T., Zinchenko, Y.: Polytopes and arrangements: diameter and curvature.
AdvOL-Report 2006/09, McMaster University (2006)
4. Karmarkar, N.K.: A new polynomial-time algorithm for linear programming. Combinatorica
4, 373–395 (1984)
14. 14 A. Deza et al.
5. Khachiyan, L.G.: A polynomial algorithm in linear programming. Soviet Math. Doklady 20,
191–194 (1979)
6. Klee, V., Minty, G.J.: How good is the simplex algorithm? In: Shisha, O. (ed.) Inequalities III,
pp. 159–175. Academic, New York (1972)
7. Megiddo, N.: Pathways to the optimal set in linear programming. In: Megiddo, N. (ed.) Progress
in Mathematical Programming: Interior-Point and Related Methods. Springer, Berlin Heidel-
berg New York pp. 131–158 (1988); also in: Proceedings of the 7th Mathematical Programming
Symposium of Japan, pp. 1–35. Nagoya, Japan (1986)
8. Megiddo, N., Shub, M.: Boundary behavior of interior point algorithms in linear programming.
Math. Oper. Res. 14–1, 97–146 (1989)
9. Roos, C., Terlaky, T., Vial, J.-Ph.: Theory and algorithms for linear optimization: an inte-
rior point approach. In: Wiley-Interscience Series in Discrete Mathematics and Optimization.
Wiley, New York (1997)
10. Sonnevend, G.: An “analytical centre” for polyhedrons and new classes of global algorithms
for linear (smooth, convex) programming. In: Prékopa, A., Szelezsán, J., Strazicky, B. (eds.)
System Modelling and Optimization: Proceedings of the 12th IFIP-Conference, Budapest 1985.
Lecture Notes in Control and Information Sciences, Springer, Berlin Heidelberg New York
Vol. 84, pp. 866–876 (1986)
11. Terlaky, T., Zhang, S.: Pivot rules for linear programming – a survey. Ann. Oper. Res. 46,
203–233 (1993)
12. Todd, M., Ye, Y.: A lower bound on the number of iterations of long-step and polynomial
interior-point linear programming algorithms. Ann. Oper. Res. 62, 233–252 (1996)
13. Vavasis, S., Ye, Y.: A primal-dual interior-point method whose running time depends only on
the constraint matrix. Math. Programm. 74, 79–120 (1996)
14. Wright, S.J.: Primal-Dual Interior-Point Methods. SIAM Publications, Philadelphia (1997)
15. Ye, Y.: Interior-Point Algorithms: Theory and Analysis. Wiley-Interscience Series in Discrete
Mathematics and Optimization. Wiley, New York (1997)